Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 12:24

General

  • Target

    NEAS.6b9abfc8743858e7af78011040551f6c7c5425a229c240d00373779e0a4c2cc1_JC.exe

  • Size

    1.2MB

  • MD5

    238b1b81eb90a37cd138696d8b5bbfee

  • SHA1

    15d4f16dbf287904dd9d2c6c345415e599d997a6

  • SHA256

    6b9abfc8743858e7af78011040551f6c7c5425a229c240d00373779e0a4c2cc1

  • SHA512

    895b6eb5393288197b24f1b08193977aa9009f20b32738ae4d0eb8a63ffeae52f705de2beee479a8a8d656f47a83733744f6d0b47425fcd93492cfc289b2a95b

  • SSDEEP

    24576:0yT+lz9iEbwqqVdGxphUG+Trc23NulRJrihWOZTS/K6LkD2Nc2vL:D4JiA4GPhxQn3NSv+4OZTELx

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6b9abfc8743858e7af78011040551f6c7c5425a229c240d00373779e0a4c2cc1_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6b9abfc8743858e7af78011040551f6c7c5425a229c240d00373779e0a4c2cc1_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xa5qx5JW.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xa5qx5JW.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vt7gf2lY.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vt7gf2lY.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oZ8aD0RH.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oZ8aD0RH.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1288
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wg3bS6uL.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wg3bS6uL.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2468
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2072
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 268
                  8⤵
                  • Program crash
                  PID:2560
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2652

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xa5qx5JW.exe
    Filesize

    1.0MB

    MD5

    9d95f80b2f27cbf94cd4c385ccd9f2ef

    SHA1

    206339d2f81985d48767d093a6eba6b1da2cb02f

    SHA256

    8fc40d60bc15f78c0dad90ca10431ddd54dbdc4094e6d9f463bc4c4f8a356d3b

    SHA512

    3130a8c3b0777eae67874701da0b6325e80b081861bf4ee681bd8633da75188ff37339fd78d6ec2576617e2b88835df295d663ee8f82cce0920e3e57e553c8f8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xa5qx5JW.exe
    Filesize

    1.0MB

    MD5

    9d95f80b2f27cbf94cd4c385ccd9f2ef

    SHA1

    206339d2f81985d48767d093a6eba6b1da2cb02f

    SHA256

    8fc40d60bc15f78c0dad90ca10431ddd54dbdc4094e6d9f463bc4c4f8a356d3b

    SHA512

    3130a8c3b0777eae67874701da0b6325e80b081861bf4ee681bd8633da75188ff37339fd78d6ec2576617e2b88835df295d663ee8f82cce0920e3e57e553c8f8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vt7gf2lY.exe
    Filesize

    884KB

    MD5

    e4cb353e23fd3518e664b71f425d7615

    SHA1

    f8e52242f5a0583c9be0d12d3b65045c326ded33

    SHA256

    e9a85807066515200e3f962842ef86d1983f1d043319ec43164b91bfd0e99e88

    SHA512

    9d56fc240fae71c7ed37fdd9b15b00f4221b5f7b200529956e37e0858c8a3c1bf137c279a708356f723e288f7f675e4dfcfc4f4ad5f7d70a3be878f30816d900

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vt7gf2lY.exe
    Filesize

    884KB

    MD5

    e4cb353e23fd3518e664b71f425d7615

    SHA1

    f8e52242f5a0583c9be0d12d3b65045c326ded33

    SHA256

    e9a85807066515200e3f962842ef86d1983f1d043319ec43164b91bfd0e99e88

    SHA512

    9d56fc240fae71c7ed37fdd9b15b00f4221b5f7b200529956e37e0858c8a3c1bf137c279a708356f723e288f7f675e4dfcfc4f4ad5f7d70a3be878f30816d900

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oZ8aD0RH.exe
    Filesize

    590KB

    MD5

    e8422e6ac0ec1d30dfe0fba7a63b2828

    SHA1

    bea8cc4c6775d8e72b18b7ab513d6a6a740af0a9

    SHA256

    f47b5592f7c753d41f800c67cb3729b1781b472d6009453a59f772b83db9234e

    SHA512

    1fb88f5bc35e6655c7179ecae19ba275f467d54a676d2ab5039749dc167b1d69c31dd3cf0afa852de80df2a3638c48e286918ba593cb09bc4855699d62e9287d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oZ8aD0RH.exe
    Filesize

    590KB

    MD5

    e8422e6ac0ec1d30dfe0fba7a63b2828

    SHA1

    bea8cc4c6775d8e72b18b7ab513d6a6a740af0a9

    SHA256

    f47b5592f7c753d41f800c67cb3729b1781b472d6009453a59f772b83db9234e

    SHA512

    1fb88f5bc35e6655c7179ecae19ba275f467d54a676d2ab5039749dc167b1d69c31dd3cf0afa852de80df2a3638c48e286918ba593cb09bc4855699d62e9287d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wg3bS6uL.exe
    Filesize

    417KB

    MD5

    702bc03653156d45cf80048d2ca53962

    SHA1

    4722c3725e56eb745f8a0f2621eead950769e517

    SHA256

    55fee6632024c8e454517e115fadf74b3a4375de072bdda9a5e9e3e2080393b5

    SHA512

    0e819b1e246612314b44fca649275d256491d19183ccae822838f893be9885bafea5b8301acb9653d5089ed9d75297f55f24fa011de85137b9f77be0e739c281

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wg3bS6uL.exe
    Filesize

    417KB

    MD5

    702bc03653156d45cf80048d2ca53962

    SHA1

    4722c3725e56eb745f8a0f2621eead950769e517

    SHA256

    55fee6632024c8e454517e115fadf74b3a4375de072bdda9a5e9e3e2080393b5

    SHA512

    0e819b1e246612314b44fca649275d256491d19183ccae822838f893be9885bafea5b8301acb9653d5089ed9d75297f55f24fa011de85137b9f77be0e739c281

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Xa5qx5JW.exe
    Filesize

    1.0MB

    MD5

    9d95f80b2f27cbf94cd4c385ccd9f2ef

    SHA1

    206339d2f81985d48767d093a6eba6b1da2cb02f

    SHA256

    8fc40d60bc15f78c0dad90ca10431ddd54dbdc4094e6d9f463bc4c4f8a356d3b

    SHA512

    3130a8c3b0777eae67874701da0b6325e80b081861bf4ee681bd8633da75188ff37339fd78d6ec2576617e2b88835df295d663ee8f82cce0920e3e57e553c8f8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Xa5qx5JW.exe
    Filesize

    1.0MB

    MD5

    9d95f80b2f27cbf94cd4c385ccd9f2ef

    SHA1

    206339d2f81985d48767d093a6eba6b1da2cb02f

    SHA256

    8fc40d60bc15f78c0dad90ca10431ddd54dbdc4094e6d9f463bc4c4f8a356d3b

    SHA512

    3130a8c3b0777eae67874701da0b6325e80b081861bf4ee681bd8633da75188ff37339fd78d6ec2576617e2b88835df295d663ee8f82cce0920e3e57e553c8f8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\vt7gf2lY.exe
    Filesize

    884KB

    MD5

    e4cb353e23fd3518e664b71f425d7615

    SHA1

    f8e52242f5a0583c9be0d12d3b65045c326ded33

    SHA256

    e9a85807066515200e3f962842ef86d1983f1d043319ec43164b91bfd0e99e88

    SHA512

    9d56fc240fae71c7ed37fdd9b15b00f4221b5f7b200529956e37e0858c8a3c1bf137c279a708356f723e288f7f675e4dfcfc4f4ad5f7d70a3be878f30816d900

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\vt7gf2lY.exe
    Filesize

    884KB

    MD5

    e4cb353e23fd3518e664b71f425d7615

    SHA1

    f8e52242f5a0583c9be0d12d3b65045c326ded33

    SHA256

    e9a85807066515200e3f962842ef86d1983f1d043319ec43164b91bfd0e99e88

    SHA512

    9d56fc240fae71c7ed37fdd9b15b00f4221b5f7b200529956e37e0858c8a3c1bf137c279a708356f723e288f7f675e4dfcfc4f4ad5f7d70a3be878f30816d900

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\oZ8aD0RH.exe
    Filesize

    590KB

    MD5

    e8422e6ac0ec1d30dfe0fba7a63b2828

    SHA1

    bea8cc4c6775d8e72b18b7ab513d6a6a740af0a9

    SHA256

    f47b5592f7c753d41f800c67cb3729b1781b472d6009453a59f772b83db9234e

    SHA512

    1fb88f5bc35e6655c7179ecae19ba275f467d54a676d2ab5039749dc167b1d69c31dd3cf0afa852de80df2a3638c48e286918ba593cb09bc4855699d62e9287d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\oZ8aD0RH.exe
    Filesize

    590KB

    MD5

    e8422e6ac0ec1d30dfe0fba7a63b2828

    SHA1

    bea8cc4c6775d8e72b18b7ab513d6a6a740af0a9

    SHA256

    f47b5592f7c753d41f800c67cb3729b1781b472d6009453a59f772b83db9234e

    SHA512

    1fb88f5bc35e6655c7179ecae19ba275f467d54a676d2ab5039749dc167b1d69c31dd3cf0afa852de80df2a3638c48e286918ba593cb09bc4855699d62e9287d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\wg3bS6uL.exe
    Filesize

    417KB

    MD5

    702bc03653156d45cf80048d2ca53962

    SHA1

    4722c3725e56eb745f8a0f2621eead950769e517

    SHA256

    55fee6632024c8e454517e115fadf74b3a4375de072bdda9a5e9e3e2080393b5

    SHA512

    0e819b1e246612314b44fca649275d256491d19183ccae822838f893be9885bafea5b8301acb9653d5089ed9d75297f55f24fa011de85137b9f77be0e739c281

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\wg3bS6uL.exe
    Filesize

    417KB

    MD5

    702bc03653156d45cf80048d2ca53962

    SHA1

    4722c3725e56eb745f8a0f2621eead950769e517

    SHA256

    55fee6632024c8e454517e115fadf74b3a4375de072bdda9a5e9e3e2080393b5

    SHA512

    0e819b1e246612314b44fca649275d256491d19183ccae822838f893be9885bafea5b8301acb9653d5089ed9d75297f55f24fa011de85137b9f77be0e739c281

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gf46Sk0.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • memory/2072-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2072-58-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2072-53-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2072-60-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2072-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2072-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2072-57-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2072-56-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2072-55-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2072-54-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB